Download presentation
Presentation is loading. Please wait.
Published byCurtis Allan Henry Modified over 8 years ago
1
Cisco 1 - Networking Basics Perrine. J Page 16/5/2016 Chapter 11 At which layer of the TCP/IP model does Telnet operate? 1.application 2.presentation 3.session 4.transport 5.internet 6.network access
2
Cisco 1 - Networking Basics Perrine. J Page 26/5/2016 Chapter 11 At which layer of the TCP/IP model does Telnet operate? 1.application 2.presentation 3.session 4.transport 5.internet 6.network access
3
Cisco 1 - Networking Basics Perrine. J Page 36/5/2016 Chapter 11 Which of the following SNMP components would a router be considered? 1.network management system 2.agents 3.managed devices 4.secure ports
4
Cisco 1 - Networking Basics Perrine. J Page 46/5/2016 Chapter 11 Which of the following SNMP components would a router be considered? 1.network management system 2.agents 3.managed devices 4.secure ports
5
Cisco 1 - Networking Basics Perrine. J Page 56/5/2016 Chapter 11 Which SNMP component is responsible for using the majority of memory resources? 1.network management system 2.agents 3.managed devices 4.secure ports
6
Cisco 1 - Networking Basics Perrine. J Page 66/5/2016 Chapter 11 Which SNMP component is responsible for using the majority of memory resources? 1.network management system 2.agents 3.managed devices 4.secure ports
7
Cisco 1 - Networking Basics Perrine. J Page 76/5/2016 Chapter 11 Which protocol is used by e-mail servers to communicate with each other? 1.FTP 2.HTTP 3.TFTP 4.SMTP 5.POP 6.SNMP
8
Cisco 1 - Networking Basics Perrine. J Page 86/5/2016 Chapter 11 Which protocol is used by e-mail servers to communicate with each other? 1.FTP 2.HTTP 3.TFTP 4.SMTP 5.POP 6.SNMP
9
Cisco 1 - Networking Basics Perrine. J Page 96/5/2016 Chapter 11 Which part of the URL http://www.awsb.ca/teacher gives the name of the domain? 1.www 2.http:// 3./teacher 4.awsb.ca
10
Cisco 1 - Networking Basics Perrine. J Page 106/5/2016 Chapter 11 Which part of the URL http://www.awsb.ca/teacher gives the name of the domain? 1.www 2.http:// 3./teacher 4.awsb.ca
11
Cisco 1 - Networking Basics Perrine. J Page 116/5/2016 Chapter 11 Which of the following are disadvantages of using SMTP for e-mail servers? (Choose two.) 1.offers very little security 2.no authentication 3.strong reliability 4.does not work well with email servers
12
Cisco 1 - Networking Basics Perrine. J Page 126/5/2016 Chapter 11 Which of the following are disadvantages of using SMTP for e-mail servers? (Choose two.) 1.offers very little security 2.no authentication 3.strong reliability 4.does not work well with email servers
13
Cisco 1 - Networking Basics Perrine. J Page 136/5/2016 Chapter 11 Which of the following are components of SNMP? (Choose three.) 1.network management system 2.protocol analyzer 3.managed devices 4.secure ports 5.agents 6.protocol inspector
14
Cisco 1 - Networking Basics Perrine. J Page 146/5/2016 Chapter 11 Which of the following are components of SNMP? (Choose three.) 1.network management system 2.protocol analyzer 3.managed devices 4.secure ports 5.agents 6.protocol inspector
15
Cisco 1 - Networking Basics Perrine. J Page 156/5/2016 Chapter 11 Which of the following uses a connectionless protocol to transfer files? 1.FTP 2.TFTP 3.HTTP 4.SNMP
16
Cisco 1 - Networking Basics Perrine. J Page 166/5/2016 Chapter 11 Which of the following uses a connectionless protocol to transfer files? 1.FTP 2.TFTP 3.HTTP 4.SNMP
17
Cisco 1 - Networking Basics Perrine. J Page 176/5/2016 Chapter 11 Which type of institution does the domain suffix.org represent? 1.government 2.education 3.network 4.non-profit
18
Cisco 1 - Networking Basics Perrine. J Page 186/5/2016 Chapter 11 Which type of institution does the domain suffix.org represent? 1.government 2.education 3.network 4.non-profit
19
Cisco 1 - Networking Basics Perrine. J Page 196/5/2016 Chapter 11 Which protocol is used by FTP to transfer files over the Internet? 1.TCP 2.SMTP 3.UDP 4.SNMP
20
Cisco 1 - Networking Basics Perrine. J Page 206/5/2016 Chapter 11 Which protocol is used by FTP to transfer files over the Internet? 1.TCP 2.SMTP 3.UDP 4.SNMP
21
Cisco 1 - Networking Basics Perrine. J Page 216/5/2016 Chapter 11 Which TCP/IP layer is responsible for dialog control? 1.application 2.presentation 3.session 4.transport
22
Cisco 1 - Networking Basics Perrine. J Page 226/5/2016 Chapter 11 Which TCP/IP layer is responsible for dialog control? 1.application 2.presentation 3.session 4.transport
23
Cisco 1 - Networking Basics Perrine. J Page 236/5/2016 Chapter 11 What does TCP use to begin the three-way handshaking process? 1.The destination host sends an ACK segment. 2.The sending host sends a SYN segment. 3.The sending host sends a SYN and ACK segment. 4.The destination host sends a SYN segment.
24
Cisco 1 - Networking Basics Perrine. J Page 246/5/2016 Chapter 11 What does TCP use to begin the three-way handshaking process? 1.The destination host sends an ACK segment. 2.The sending host sends a SYN segment. 3.The sending host sends a SYN and ACK segment. 4.The destination host sends a SYN segment.
25
Cisco 1 - Networking Basics Perrine. J Page 256/5/2016 Chapter 11 Which of the following protocols use TCP? (Choose two.) 1.FTP 2.DHCP 3.TFTP 4.HTTP 5.SYN
26
Cisco 1 - Networking Basics Perrine. J Page 266/5/2016 Chapter 11 Which of the following protocols use TCP? (Choose two.) 1.FTP 2.DHCP 3.TFTP 4.HTTP 5.SYN
27
Cisco 1 - Networking Basics Perrine. J Page 276/5/2016 Chapter 11 Which of the following is true when the TCP window size is 3 and data transmission has just begun? 1.The source must receive an "ACK 3" acknowledgement before sending more data. 2.The destination must receive an "ACK 3" acknowledgement before accepting more data. 3.The source must receive an "ACK 4" acknowledgement before sending more data. 4.The destination must receive an "ACK 4" acknowledgement before accepting more data.
28
Cisco 1 - Networking Basics Perrine. J Page 286/5/2016 Chapter 11 Which of the following is true when the TCP window size is 3 and data transmission has just begun? 1.The source must receive an "ACK 3" acknowledgement before sending more data. 2.The destination must receive an "ACK 3" acknowledgement before accepting more data. 3.The source must receive an "ACK 4" acknowledgement before sending more data. 4.The destination must receive an "ACK 4" acknowledgement before accepting more data.
29
Cisco 1 - Networking Basics Perrine. J Page 296/5/2016 Chapter 11 Which protocol can be used to load or retrieve Cisco IOS images to or from a router? 1.SNMP 2.TFTP 3.UDP 4.TCP
30
Cisco 1 - Networking Basics Perrine. J Page 306/5/2016 Chapter 11 Which protocol can be used to load or retrieve Cisco IOS images to or from a router? 1.SNMP 2.TFTP 3.UDP 4.TCP
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.